|  |  | @ -81,7 +81,8 @@ line/.style={-latex}   % the lesser the width the greater will be the diagram wi | 
			
		
	
		
		
			
				
					
					|  |  |  |   \draw[->] (c1) -| ([xshift=-1cm]mgen); |  |  |  |   \draw[->] (c1) -| ([xshift=-1cm]mgen); | 
			
		
	
		
		
			
				
					
					|  |  |  |   \draw[->] (kgen) -| ([xshift=1cm]mgen); |  |  |  |   \draw[->] (kgen) -| ([xshift=1cm]mgen); | 
			
		
	
		
		
			
				
					
					|  |  |  | \end{tikzpicture}   |  |  |  | \end{tikzpicture}   | 
			
		
	
		
		
			
				
					
					|  |  |  | \caption{This Diagram shows how an Attacker can calculate the Key $K$ and the Message $M_1$.} |  |  |  | \caption{This Diagram shows how an attacker can calculate the key $K$ and the message $M_1$. \newline | 
			
				
				
			
		
	
		
		
	
		
		
			
				
					
					|  |  |  |  |  |  |  |     $C_x$, $C_y$ and $M_2$ are known to the attacker.} | 
			
		
	
		
		
			
				
					
					|  |  |  | \end{figure} |  |  |  | \end{figure} | 
			
		
	
		
		
			
				
					
					|  |  |  | A few requirements must be satisfied in order to get hold of the $K$ and the $M_1$: |  |  |  | A few requirements must be satisfied in order to get hold of the $K$ and the $M_1$: | 
			
		
	
		
		
			
				
					
					|  |  |  | \begin{itemize} |  |  |  | \begin{itemize} | 
			
		
	
	
		
		
			
				
					|  |  | 
 |